Privacy protection method for fog-assisted industrial Internet of things

文档序号:1478690 发布日期:2020-02-25 浏览:2次 中文

阅读说明:本技术 一种雾协助工业物联网的隐私保护方法 (Privacy protection method for fog-assisted industrial Internet of things ) 是由 陈思光 李雅兰 王晓玲 杨丽 王堃 于 2019-11-14 设计创作,主要内容包括:本发明公开了一种雾协助工业物联网的隐私保护方法,属于计算机网络安全领域,包括以下步骤:雾协助工业物联网系统初始化;对感知层设备获取的数据进行加密,将获得的感知层密文c<Sub>ij,τ</Sub>传输至该感知层设备所属子区域对应的雾节点;所述雾节点接收到所述感知层密文c<Sub>ij,τ</Sub>后,对感知层密文c<Sub>ij,τ</Sub>进行聚合,得到子区域聚合密文C<Sub>i,τ</Sub>及并将所述子区域聚合密文C<Sub>i,τ</Sub>传输至工业云;工业云接收到子区域聚合密文C<Sub>i,τ</Sub>后,对子区域聚合密文C<Sub>i,τ</Sub>进行二次聚合得到全局聚合密文C<Sub>τ</Sub>并解密;根据解密后的全局聚合密文,获得每个子区域的统计和D<Sub>i,τ</Sub>,每个子区域相应的均值E<Sub>i,τ</Sub>,k个子区域的全局统计和D<Sub>τ</Sub>和k个子区域相应均值E<Sub>τ</Sub>。本发明可对物联网内数据传输进行隐私保护,并且可同时提供粗粒度服务和细粒度服务。(The invention discloses a privacy protection method of a fog-assisted industrial Internet of things, belonging to the field of computer network security and comprising the following steps: initializing an industrial Internet of things system by aid of fog; encrypting the data acquired by the sensing layer equipment, and acquiring a sensing layer ciphertext c ij,τ Transmitting the data to the fog nodes corresponding to the subareas of the sensing layer equipment; the fog node receives the ciphertext c of the perception layer ij,τ Then, the ciphertext c of the perception layer ij,τ Polymerizing to obtain a sub-region polymerized ciphertext C i,τ And aggregating the sub-regions into a ciphertext C i,τ Transmitting to an industrial cloud; industrial cloud receiving sub-region aggregation ciphertext C i,τ Thereafter, ciphertext C is aggregated for the sub-regions i,τ Carrying out secondary polymerization to obtain a global polymerization ciphertext C τ And decrypting; obtaining the statistics sum D of each sub-region according to the decrypted global aggregation ciphertext i,τ The mean value E corresponding to each sub-region i,τ Global statistics sum of k subregions D τ And k corresponding mean values E of the sub-regions τ . The invention can carry out privacy protection on data transmission in the Internet of things and can provide coarse-grained service and fine-grained service at the same time.)

1. A privacy protection method of a fog-assisted industrial Internet of things is characterized by comprising the following steps:

initializing an industrial Internet of things system by aid of fog;

encrypting the data acquired by the sensing layer equipment, and acquiring a sensing layer ciphertext cij,τTransmitting the data to the fog nodes corresponding to the subareas of the sensing layer equipment;

the fog node receives the ciphertext c of the perception layerij,τThen, the ciphertext c of the perception layerij,τPolymerizing to obtain a sub-region polymerized ciphertext Ci,τAnd aggregating the sub-regions into a ciphertext Ci,τTransmitting to an industrial cloud;

industrial cloud receiving sub-region aggregation ciphertext Ci,τThereafter, ciphertext C is aggregated for the sub-regionsi,τCarrying out secondary polymerization to obtain a global polymerization ciphertext CτAnd decrypting;

obtaining the statistics sum D of each sub-region according to the decrypted global aggregation ciphertexti,τThe mean value E corresponding to each sub-regioni,τGlobal statistics sum of k subregions DτAnd k corresponding mean values E of the sub-regionsτ

2. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the perception layer ciphertext cij,τCalculated from equation (1):

Figure FDA0002273328050000011

wherein N is a homomorphic encrypted public key, m'ij,τ=mij,τ·ai,mij,τAt a time tτPerception device IIDijRaw perceptual data collected, aiIs a subregion AiCoefficient of (1), SijFor sensing devices IIDijSecret key of h (t)τ) Is given by tτA hash value calculated as an input value to the hash function h,

Figure FDA0002273328050000012

3. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the method also includes obtaining a perceptual layer ciphertext cij,τTime, to the perception layer ciphertext cij,τCurrent hash chain value Hij,τCalculating and adding the hash chain value Hij,τTransmitting to the fog node, the hash chain value Hij,τCiphertext c for sensing layer by fog nodeij,τThe integrity verification of.

4. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 3, wherein: the fog node is opposite to the perception layer ciphertext cij,τThe integrity verification of (a) comprises the steps of:

mist node ciphertext c based on perception layerij,τCalculating Hash chain value H 'for verification'ij,τ

Inspection of equation H'ij,τ=Hij,τIf yes, then the perception layer cipher text cij,τAnd (4) completing.

5. The privacy protection method for the fog-assisted industrial internet of things as claimed in claim 1, wherein the privacy protection method is characterized in that: the method further comprises aggregating ciphertext C in the obtained sub-regioni,τThen, the ciphertext C is aggregated to the sub-regioni,τCorresponding verification code Hi,τAnd calculating the verification code Hi,τTransmitting to an industrial cloud, the verification code Hi,τCiphertext C for industrial cloud pair sub-region aggregationi,τThe integrity verification of.

6. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the sub-region aggregation ciphertext Ci,τCalculated from equation (2):

Figure FDA0002273328050000021

wherein m'ij,τ=mij,τ·ai,mij,τAt a time tτRaw perceptual data collected, aiIs a subregion AiN is the fog node fogiSubdomain a of jurisdictioniNumber of sensing devices accommodated, h (t)τ) With tτA hash value calculated as an input value to the hash function h,is a subregion AiThe sum of secret keys of the N sensing devices in the network, wherein N is a homomorphic encrypted public key.

7. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the global aggregate ciphertext CτCalculated from equation (3):

wherein the content of the first and second substances,m 'corresponding to k x n sensing device data'ij,τThe sum of the total weight of the components,

Figure FDA0002273328050000034

8. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the pair sub-region aggregation ciphertext Ci,τThe decryption includes the steps of:

using an industrial cloud Key s0Aggregating global ciphertext CτSimplifying and decrypting to obtain a pseudo-global aggregate value W, wherein the pseudo-global aggregate value W is obtained by calculating according to a formula (4):

wherein, aiIs a subregion AiCoefficient of (a), mij,τAt a time tτPerception device IIDijI is more than or equal to 1 and less than or equal to k, j is more than or equal to 1 and less than or equal to n, k is the number of subareas of the sensing layer, and n is a fog node fogiSubdomain a of jurisdictioniThe number of sensing devices accommodated.

9. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the statistical sum D of each sub-regioni,τThe mean value E corresponding to each sub-regioni,τGlobal statistics sum of k subregions DτAnd k corresponding mean values E of the sub-regionsτCalculated from equation (5):

Figure FDA0002273328050000041

wherein W is a pseudo global aggregation value,

Figure FDA0002273328050000042

10. The privacy protection method of the fog-assisted industrial internet of things as claimed in claim 1, wherein: the method also includes fault tolerant processing of the incomplete aggregated ciphertext.

Technical Field

The invention relates to a privacy protection method of a fog-assisted industrial Internet of things, and belongs to the field of computer network security.

Background

With the increasing popularity of the Internet of things (IoT) in the Industrial field, the Industrial Internet of things (IIoT) is receiving more and more attention from researchers as an important application of the Internet of things in the industry. IIoT addresses any device in an interconnected industrial setting, such as embedded sensors, machine devices and actuators, etc., that can sample, process and apply real-time data in an industrial environment to facilitate the transition from the traditional industry to the smart industry. Due to the limited resources of devices and sensors, the traditional IIoT architecture introduces cloud computing technology, and all collected data is sent to the cloud for processing and storage, so as to reduce the computing and storage cost of local devices. However, with the rapid deployment of IIoT devices, more and more data is frequently sent to the remote cloud, which not only results in significant communication costs, but also puts significant processing and storage pressure on the cloud. Therefore, it is impractical to rely solely on the cloud for delay-sensitive IIoT systems. Under the condition, the fog computing is introduced into IIoT as an extension of cloud computing, so that the local data processing and storage capacity at the edge of the network is improved, and the time delay and the communication cost are effectively reduced. For example, the user terminal can directly migrate the calculation and storage tasks to the fog nodes located at the edge of the network, so that the processing pressure of the cloud is reduced, and low delay is realized.

Data aggregation is considered an effective way to reduce communication overhead, e.g., a fog node may perform a data aggregation operation on received data and then pass the single aggregation result to the cloud, which may significantly reduce the amount of data transmission. While data aggregation can achieve significant performance gains, aggregation operations performed at untrusted third parties are often subject to privacy and security (confidentiality and integrity) threats. For example, entities that are curious inside the system (e.g., fog nodes and clouds) may learn from the received data the individual data that contains private content.

In order to solve the above problems, some privacy-preserving data aggregation schemes based on fog calculation have been developed in recent years. However, existing privacy protection schemes are only used to support the computation of global aggregated results, which cannot provide fine-grained data services. For example, the cloud cannot learn the aggregated results for a particular sub-region that may be useful for some applications.

Disclosure of Invention

The invention provides a privacy protection method of a fog-assisted industrial Internet of things, which can carry out privacy protection on data transmission in the Internet of things and can provide coarse-grained service and fine-grained service at the same time.

In order to achieve the purpose, the technical scheme adopted by the invention is as follows: a privacy protection method of a fog-assisted industrial Internet of things comprises the following steps: initializing an industrial Internet of things system by aid of fog; encrypting the data acquired by the sensing layer equipment, and acquiring a sensing layer ciphertext cij,τTransmitting the data to the fog nodes corresponding to the subareas of the sensing layer equipment; the fog node receives the ciphertext c of the perception layerij,τThen, the ciphertext c of the perception layerij,τPolymerizing to obtain a sub-region polymerized ciphertext Ci,τAnd aggregating the sub-regions into a ciphertext Ci,τTransmitting to an industrial cloud; industrial cloud receiving sub-region aggregation ciphertext Ci,τThereafter, ciphertext C is aggregated for the sub-regionsi,τCarrying out secondary polymerization to obtain a global polymerization ciphertext CτAnd decrypting; obtaining the statistics sum D of each sub-region according to the decrypted global aggregation ciphertexti,τThe mean value E corresponding to each sub-regioni,τGlobal statistics sum of k subregions DτAnd k corresponding mean values E of the sub-regionsτ

Further, the perception layer ciphertext cij,τCalculated from equation (1):

Figure BDA0002273328060000031

wherein N is a homomorphic encrypted public key, m'ij,τ=mij,τ·ai,mij,τAt a time tτPerception device IIDijRaw perceptual data collected, aiIs a subregion AiCoefficient of (1), SijFor sensing devices IIDijSecret key of h (t)τ) Is given by tτA hash value calculated as an input value to the hash function h,

Figure BDA0002273328060000033

is an integer set of N, i is more than or equal to 1 and less than or equal to k, j is more than or equal to 1 and less than or equal to N, k is the number of the sub-regions of the sensing layer, and N is a fog node fogiSubdomain a of jurisdictioniThe number of sensing devices accommodated.

Further, the method also comprises the step of obtaining the ciphertext c of the perception layerij,τTime, to the perception layer ciphertext cij,τCurrent hash chain value Hij,τCalculating and adding the hash chain value Hij,τTransmitting to the fog node, the hash chain value Hij,τCiphertext c for sensing layer by fog nodeij,τThe integrity verification of.

Further, the fog node is used for receiving the sensing layer ciphertext cij,τThe integrity verification of (a) comprises the steps of: mist node ciphertext c based on perception layerij,τCalculating Hash chain value H 'for verification'ij,τ(ii) a Inspection of equation H'ij,τ=Hij,τIf yes, then the perception layer cipher text cij,τAnd (4) completing.

Further, the method also comprises the step of aggregating the ciphertext C in the obtained sub-regioni,τThen, the ciphertext C is aggregated to the sub-regioni,τCorresponding verification code Hi,τAnd calculating the verification code Hi,τTransmitting to an industrial cloud, the verification code Hi,τFor industrial cloud pairRegion aggregation ciphertext Ci,τThe integrity verification of.

Further, the sub-region aggregation ciphertext Ci,τCalculated from equation (2):

Figure BDA0002273328060000034

wherein m'ij,τ=mij,τ·ai,mij,τAt a time tτRaw perceptual data collected, aiIs a subregion AiN is the fog node fogiSubdomain a of jurisdictioniNumber of sensing devices accommodated, h (t)τ) With tτA hash value calculated as an input value to the hash function h,

Figure BDA0002273328060000041

is a subregion AiThe sum of secret keys of the N sensing devices in the network, wherein N is a homomorphic encrypted public key.

Further, the global aggregate ciphertext CτCalculated from equation (3):

Figure BDA0002273328060000042

wherein the content of the first and second substances,

Figure BDA0002273328060000043

m 'corresponding to k x n sensing device data'ij,τThe sum of the total weight of the components,

Figure BDA0002273328060000044

secret key s for k × n sensing devicesijSum of m'ij,τ=mij,τ·ai,mij,τAt a time tτPerception device IIDijRaw perceptual data collected, aiIs a subregion AiN is a homomorphic encrypted public key, h (t)τ) Is given by tτThe hash value obtained by calculation as the input value of the hash function h is more than or equal to 1 and less than or equal to k, and is more than or equal to 1 and less than or equal to n,k is the number of the subareas of the sensing layer, and n is the fog node fogiSubdomain a of jurisdictioniThe number of sensing devices accommodated.

Further, the pair sub-region aggregation ciphertext Ci,τThe decryption includes the steps of: using an industrial cloud Key s0Aggregating global ciphertext CτSimplifying and decrypting to obtain a pseudo-global aggregate value W, wherein the pseudo-global aggregate value W is obtained by calculating according to a formula (7):

Figure BDA0002273328060000045

wherein, aiIs a subregion AiCoefficient of (a), mij,τAt a time tτPerception device IIDijI is more than or equal to 1 and less than or equal to k, j is more than or equal to 1 and less than or equal to n, k is the number of subareas of the sensing layer, and n is a fog node fogiSubdomain a of jurisdictioniThe number of sensing devices accommodated.

Further, the statistical sum D of each sub-regioni,τThe mean value E corresponding to each sub-regioni,τGlobal statistics sum of k subregions DτAnd k corresponding mean values E of the sub-regionsτCalculated from equation (8):

wherein W is a pseudo global aggregation value,

Figure BDA0002273328060000052

l is the system security parameter, k is piIs a relatively prime positive integer, k is the number of sub-regions of the sensing layer, and n is a fog node fogiSubdomain a of jurisdictioniThe number of sensing devices accommodated.

Further, the method further comprises fault-tolerant processing of the incomplete aggregated ciphertext.

According to the invention, data aggregation is carried out at the fog nodes, so that the data transmission quantity is remarkably reduced; the data privacy and confidentiality are effectively protected by adopting homomorphic encryption, and meanwhile, the integrity of the data is ensured by adopting a hash chain mechanism for the data. According to the method, hierarchical aggregation is adopted, so that the cloud can provide coarse and fine granularity data service by obtaining the aggregation result of each sub-area and the whole area, meanwhile, due to fault-tolerant processing, when a sensing device or a transmission channel has a fault, the cloud can still decrypt an incomplete aggregation ciphertext and obtain a correct aggregation result, the safety performance of the system is improved, and the method is more suitable for practical application scenes.

Drawings

Fig. 1 is a schematic flow chart of a privacy protection method for a fog-assisted industrial internet of things according to an embodiment of the present invention;

FIG. 2 is a comparison of the present invention with respect to the calculation overhead of the SEDA aggregation scheme and the LPDA-EC aggregation method;

FIG. 3 is a comparison of data transmission amounts for the present invention with the SEDA aggregation scheme and the LPDA-EC aggregation method.

Detailed Description

For a better understanding of the nature of the invention, its description is further set forth below in connection with the specific embodiments and the drawings.

The system model of the invention is divided into three layers: perception layer, fog layer and cloud layer mainly include five entities: perception device IIDijFog nodes, Industrial Clouds (ICs), Trusted Management Authority (TMA), and users. The sensing layer is divided into a plurality of sub-regions according to the geographic position, and each sub-region comprises industrial Internet of things sensing equipment IID with sensing, processing and communication functionsijAnd the cloud node is responsible for collecting data in real time and regularly forwarding encrypted data to the industrial cloud through the fog node. The specific steps of the invention are shown in figure 1:

step 1, initializing a fog-assisted industrial Internet of things system:

1) calculating the coefficient a of each sub-regioni. The fog-assisted industrial Internet of things system initializes security parameters (mu: 512bits, l: 50bits), and then the trusted management authority randomly selects two large prime numbers Q1And Q2,|Q1|=|Q2μ | >. At the same time, homomorphism is calculatedEncrypted public key N and private key g (N ═ Q)1Q2,g=1+N),|N|=1024bits,|N22048 bits. Suppose that there are k subregions of the sensing layer and each subregion AiWhere there are n (n-200,400,600,800,1000) sensing devices, TMA selects k relatively prime positive integers p1,p2,…,pk,|piL, i is more than or equal to 1 and less than or equal to k, l is a system safety parameter, and each sub-area A is calculatediCoefficient a ofiThe calculation process is as follows:

Figure BDA0002273328060000061

2) computationally aware device IIDijSecret key S ofij. TMA uses a pseudo-random number generator to generate k x n uncorrelated random numbers s11,…,s1n,…,sk1,…,sknAnd the secret keys are respectively distributed to the corresponding perception devices to serve as secret keys.

3) Calculating a secret key s of an IC0And sent to the IC:

Figure BDA0002273328060000071

wherein the content of the first and second substances,is the sum of secret keys of k × n sensing devices, and

Figure BDA0002273328060000073

and 0 is congruence with respect to the modulus lambda.

4) To regenerate a set of pseudo random numbers I11,…,I1n,…,Ik1,…,IknH to construct a set of hash chain heads H00,…H0n,…,Hk0,…HknAnd (4) attaching the signature sigma of TMA to each hash chain head, and sending to the corresponding IIoT sensing equipment and the fog node.

The TMA selects a cyclic group G, | G | ═ 160bits and two secure cryptographic hash functions H and H, where

Figure BDA0002273328060000074

Figure BDA0002273328060000075

Is an integer set of integers with N.

5) Computing fog node fogiAnd shared secret key k between ICsi. TMA selects a random number k of 160bitsiAs fog node fogiAnd shared keys between ICs.

Step 2, encrypting the data acquired by the sensing layer equipment to obtain a sensing layer ciphertext cij,τ. For the ciphertext c of the sensing layerij,τCurrent hash chain value Hij,τCalculating and converting the perception layer ciphertext cij,τAnd a hash chain value Hij,τAnd transmitting the data to the fog nodes corresponding to the subareas of the sensing layer equipment.

The sensing device continuously collects real-time sensing data and periodically sends the collected data to the IC through the fog node. Suppose there are k subregions A in the perceptual layeriSatisfies the conditions

Figure BDA0002273328060000076

I is more than or equal to 1 and less than or equal to k, r is more than or equal to 1 and less than or equal to k, and i is not equal to r. Each sub-region AiAre all composed of an adjacent fog node fogiAdministered and each sub-area AiAll accommodate n sensing devices IIDij. Let the reporting period of the perceiving device be Γ ═ t1,t2,…,tMAX}, sensing device IIDijAt time tτThe raw perceptual data collected by e Γ is denoted as mij,τ∈ZN,ZNIs an integer set from 0 to N-1, i is more than or equal to 1 and less than or equal to k, and j is more than or equal to 1 and less than or equal to N.

1) At time tτ,IIDijFirst with tτCalculating as the input value of the hash function h to obtain the hash valueReuse its private key sijCalculating a real-time value

Figure BDA0002273328060000082

Then according to the known area coefficient aiAnd homomorphic encryption algorithm, IIDijCan obtain the ciphertext c of the sensing layerij,τ

Figure BDA0002273328060000083

Wherein m'ij,τ=mij,τ·ai

2) Computing perception layer ciphertext cij,τCurrent hash chain value of Hij,τ

Figure BDA0002273328060000084

Wherein, H (c)ij,τ) To c is provided withij,τHash values calculated as input values to a hash function H, Hij,τ-1Is the previous time tτ-1The hash chain value of (1).

3) Forming a perception layer report (c)ij,τ,Hij,τ) And reporting the perception layer (c)ij,τ,Hij,τ) Sending to the fog node fog of the upper layeri

Step 3, fog node fogiReceiving a perception layer ciphertext cij,τThen, verify the perception layer ciphertext cij,τIntegrity of (2) the complete sensing layer ciphertext cij,τPolymerizing to obtain a sub-region polymerized ciphertext Ci,τ. Aggregate ciphertext C for sub-regionsi,τCorresponding verification code Hi,τCalculating and aggregating the sub-regions into a ciphertext Ci,τAnd a verification code Hi,τAnd transmitting to the industrial cloud.

1) When fog node fogiIn time slot tτReceives the subdomain A of which it is administerediPerception report sent by all perception devices (c)ij,τ,Hij,τ) When the hash chain value H in the report is checked firstij,τThe correctness of the received data is verified in turn, and the specific process is as follows: fogiCiphertext c based on perception layerij,τComputing hash chain values for verification

Figure BDA0002273328060000085

Inspection of equation H'ij,τ=Hij,τWhether or not this is true. If true, verify pass, fogiReceiving a perception layer ciphertext cij,τAnd store Hij,τFor the next integrity verification.

2) When n verified perception layer ciphertexts c are obtainedij,τJ is not less than 1 and not more than n, when, fogiBy utilizing the additive homomorphism of the homomorphic encryption ciphertext, the subdomain A under jurisdiction is encrypted under the condition of no decryptioniN verified perceptual layer ciphertexts cij,τPolymerizing to obtain a sub-region polymerized ciphertext Ci,τ

Figure BDA0002273328060000091

Wherein the content of the first and second substances,

Figure BDA0002273328060000092

is a subregion AiThe sum of the secret keys of the inner n perceiving devices.

3) To ensure the subregion AiIs used to aggregate ciphertext Ci,τIntegrity of (2), fogiBy sharing key k with industrial cloudiCalculating the verification code Hi,τ=H(Ci,τ||ki) Providing verification evidence for IC, and forming a fog node report (C)i,τ,Hi,τ) And from fog node fogiIs transmitted to the IC. Wherein, H (C)i,τ||ki) To be Ci,τAnd kiThe concatenation result of (a) is used as a hash value calculated from the hash function H input value.

Step 4, receiving the sub-region aggregation ciphertext C by the industrial cloudi,τAnd then sequentially verifying the aggregation ciphertext C of all the sub-region sub-regionsi,τIntegrity of (2), aggregating ciphertext C for verified sub-regionsi,τAnd performing aggregation and decryption.

1) The industrial cloud receives the fog node reports of k fog nodes (C)i,τ,Hi,τ) I is more than or equal to 1 and less than or equal to k, and then all are verified in sequenceSub-region aggregate ciphertext Ci,τThe integrity of the method comprises the following specific processes: the industrial cloud is based on the previous hash chain value Hi,τ-1ComputingTo verify equation H'i,τ=Hi,τWhether or not it is correct, wherein H (C)i,τ) To be Ci,τA hash value calculated as an input value to a hash function H. If the equation is correct, the verification is passed, and the industrial cloud accepts Ci,τ

2) The ciphertexts of all the sub-regions are aggregated to form a global aggregated ciphertext Cτ

Figure BDA0002273328060000094

Wherein the content of the first and second substances,

Figure BDA0002273328060000095

m 'corresponding to k x n sensing device data'ij,τThe sum of the total weight of the components,

Figure BDA0002273328060000096

secret key s for k × n sensing devicesijAnd (4) summing.

3) Private key s using industrial cloud0Elimination of CτThe expression includes h (t)τ) The term (c) is reduced to obtain a value B:

Figure BDA0002273328060000101

4) according to the value B, the industrial cloud can decrypt to obtain a pseudo global aggregation value W:

Figure BDA0002273328060000102

5) based on known system parameters piThe industrial cloud may obtain the statistics and D for each sub-regioni,τThe mean value E corresponding to each sub-regioni,τK sub-regionsGlobal statistics sum DτAnd k corresponding mean values E of the sub-regionsτ

Figure BDA0002273328060000103

And 5, fault tolerance.

Some devices in the sub-area fail at some time and the fog node cannot receive its report, causing the fog node and the cloud to receive incomplete aggregate results. Since the cloud has only one key s0The incomplete aggregate ciphertext is obtained, so that the decryption process cannot be successfully executed, and the cloud cannot correctly decrypt the aggregate ciphertext.

Order to

Figure BDA0002273328060000104

The representation contains sub-region AiA collection of inter-failed devices. C'τRepresents fogiAt time tτIncomplete aggregated results are received. To obtain a failure set Ai'Medium device-related information h' (t)τ),fogiSending one loss report (A ') to TMA'i,tτ). Report (A 'is received since TMA manages keys of all devices'i,tτ) Thereafter, TMA may be A'iPrivate key calculation h' (t) of the devices involved in (1)τ):

Figure BDA0002273328060000111

Wherein the content of the first and second substances,

Figure BDA0002273328060000112

is Ai' the sum of the failed device private keys contained.

Then h' (t)τ) Reverting to fogi. Receives h' (t)τ) Then, fogiIt was then calculated with C'τCombining to obtain decipherable cipher text C "τ

Wherein the content of the first and second substances,

Figure BDA0002273328060000114

is a subregion AiRemoving A'iM 'of the faulty device contained in'iu,τAnd (4) summing.

Then, through the same decryption process, the cloud can still decrypt the incomplete aggregation ciphertext and obtain the aggregation statistic value.

Aiming at the problem that a large amount of calculation and bandwidth resources are required to be sacrificed in the process of realizing safe and efficient data collection and application of the current industrial Internet of things data aggregation research scheme, the data aggregation method and the system can provide effective protection for data privacy, confidentiality and integrity by adopting homomorphic Paillier encryption and a lightweight Hash chain mechanism. In particular, data privacy of individual devices is also protected at semi-trusted fog nodes and clouds. Meanwhile, by performing local data aggregation at the fog node, the amount of data transmission is significantly reduced. In addition, hierarchical aggregation enables the cloud to provide fine and coarse granularity data services by obtaining the aggregation results of the sub-regions and the whole region. In addition, fault tolerance is supported in the decryption process of the cloud, and even if some sensing devices or channel links are in failure, the cloud can still decrypt the incomplete aggregation ciphertext and obtain a correct aggregation result. A comparative analysis of the present method with existing methods shows that the present method has less computational and communication costs, as shown in fig. 2 and 3.

FIG. 2 is a comparison of the present invention with two other aggregation schemes, SEDA and LPDA-EC, in terms of computational overhead. Compared with other two methods, the method has the advantages that the calculation time is obviously shortened, and particularly, with the addition of more and more sensing devices, the advantage of low calculation cost is more prominent.

In addition, fig. 3 shows that compared with the two aggregation methods of the SEDA and the LPDA-EC, the present invention realizes the least data transmission amount, and effectively reduces the communication overhead and the bandwidth consumption in the industrial internet of things.

It should be noted that while the invention has been described in terms of the above-mentioned embodiments, there are many other embodiments of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention, and it is intended that all such changes and modifications be covered by the appended claims and their equivalents.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种微服务注册方法和装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类